Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Zhejiang University(Engineering Science)》 2012-01
Add to Favorite Get Latest Update

Detecting suspicious node within one cluster in wireless sensor network using game theoretic approach

PAN Ju-long1,2,LI Shan-ping1,ZHANG Dao-yuan2(1.College of Computer Science and Technology,Zhejiang University,Hangzhou 310027,China; 2.Department of Computer Science and Technology,China Jiliang University,Hangzhou 310018,China)  
A new method using game theoretic approach with multiple detecting nodes within one cluster was proposed after clusters were formed by using low-energy adaptive clustering hierarchy(LEACH)-C router protocol in order to detect and distinguish suspicious nodes in wireless sensor network.A suspicious node in a cluster is determined as malicious or normal one by the cluster-head using majority voting principle after all its neighbor's decisions are collected.A symmetrical encryption algorithm is used to secure the neighbor's result transmission.If the suspicious node is malicious,the final detecting result will be broadcasted to all nodes within this cluster and the suspicious one will be isolated in order to decrease the risk of invasion.The energy consume of both attacker and defender in the game is considered to fit the wireless sensor network environment.Experimental results show that the multiple detecting nodes scheme is feasible and effective to use game theoretic approach in wireless sensor network,and the detection precision is promoted.
【Fund】: 国家自然科学基金资助项目(60773180)
【CateGory Index】: TP212.9;TN915.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 4 Hits
1 PAN Julong1,2* ,LI Shanping 1,ZHANG Daoyuan2 1. College of Computer Science,Zhejiang University,Hangzhou 310027,China; 2. Department of Computer,China Jiliang University,Hangzhou 310018, ( ) China;A Study of Two Algorithms Based on Feistel Cipher in Wireless Medical Sensor Networks[J];Chinese Journal of Sensors and Actuators;2010-07
2 Li Jianzhong and Gao Hong (School of Computer Science and Technology,Harbin Institute of Technology,Harbin 150001);Survey on Sensor Network Research[J];Journal of Computer Research and Development;2008-01
3 YU Bo YANG Min WANG Zhi GAO Chuan-Shan(Department of Computer Science and Engineering,Fudan University,Shanghai 200433);Identify Abnormal Packet Loss in Selective Forwarding Attacks[J];Chinese Journal of Computers;2006-09
4 WANG Yang1) LIN Chuang1) LI Quan-Lin2) WANG Jing-Qi3) JIANG Xin1)1)(Department of Computer Science and Technology,Tsinghua University,Beijing 100084)2)(Department of Industrial Engineering,Tsinghua University,Beijing 100084)3)(Kellogg School of Management,Northeast University,Boston,Masschusetts,USA);Non-Cooperative Game Based Research on Routing Schemes for Wireless Networks[J];Chinese Journal of Computers;2009-01
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 QIN Bo-ping~ 1 , ZHOU Xian-wei~1, YANG Jun~1, LI Xiao-qin~2 1.School of Information Engineering, University of Science & Technology Beijing, Beijing 100083, China; 2. School of environmental engineering, University of Science and Technology Beijing,Beijing 100083, China;Research on Secure Strategy Based on Routing Protocol in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2006-04
2 PAN Julong1,2,LI Shanping1,WU Zhendong3,ZHANG Daoyuan21.College of Computer Science,Zhejiang University,Hangzhou 310027,China;2.Department of Computer,China Jiliang University,Hangzhou 310018,China;3.College of Comm.Eng.,Hangzhou Dianzi University,Hangzhou 310018,China;A Design of Secure Community Healthcare Monitoring System Based on Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2009-06
3 Li Jianzhong and Gao Hong (School of Computer Science and Technology,Harbin Institute of Technology,Harbin 150001);Survey on Sensor Network Research[J];Journal of Computer Research and Development;2008-01
4 REN Feng-Yuan1+, HUANG Hai-Ning2, LIN Chuang1 1(Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China) 2(Institute of Acoustics, The Chinese Academy of Sciences, Beijing 100080, China) + Corresponding author: Phn: 86-10-62783596, Fax: 86-10-62771138, E-mail: renfy@csnet1.cs.tsinghua.edu.cn;Wireless Sensor Networks[J];Journal of Software;2003-07
5 LI Jian-Zhong1,2+, LI Jin-Bao1,2, SHI Sheng-Fei1 1(School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China) 22(School of Computer Science and Technology, Heilongjiang University, Harbin 150080, China);Concepts, Issues and Advance of Sensor Networks and Data Management of Sensor Networks[J];Journal of Software;2003-10
6 LI Jian-Zhong+, GUO Long-Jiang, ZHANG Dong-Dong, WANG Wei-Ping (Institute of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China);Processing Algorithms for Predictive Aggregate Queries over Data Streams[J];Journal of Software;2005-07
7 WANG Wei-Ping1+, LI Jian-Zhong1,2, ZHANG Dong-Dong1, GUO Long-Jiang1,2 1(School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China) 2(School of Computer Science and Technology, Heilongjiang University, Harbin 150080, China);Sliding Window Based Method for Processing Continuous J-A Queries on Data Streams[J];Journal of Software;2006-04
8 GUO Long-Jiang, LI Jian-Zhong+, LI Gui-Lin (School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China);Spatio-Temporal Query Processing Method in Wireless Sensor Networks[J];Journal of Software;2006-04
9 WANG Wei-Ping1+, LI Jian-Zhong1,2, ZHANG Dong-Dong1, GUO Long-Jiang1,2 1(School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China) 2(School of Computer Science and Technology, Heilongjiang University, Harbin 150080, China);An Efficient Algorithm for Mining Approximate Frequent Item over Data Streams[J];Journal of Software;2007-04
10 LI Gui-Lin,GAO Hong (School of Computer Science and Technology,Harbin Institute of Technology,Harbin 150001,China);A Load Balance Data Storage Method Based on Ring for Sensor Networks[J];Journal of Software;2007-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved